Un-installation
:)
Packaging
Microsoft installer package
Other Check for genuineness Contact author if essential and if required to report an issue
Accessible
Contact information Read reports of incidents reported earlier or in a previous version Fixes made available in the current version Software can be downloaded, installed and un-installed remotely by a privileged / authorized user only
Functions
Run / Run as administrator
.exe
From command prompt
Cancel un-installation - Check if all / partial files are removed / deleted from the installed location
Delete supporting files from the installed folder to check if un-installation completes or errors out
Add / delete files from the installed folder to test changes to the software installed Check for read, write and execute permission to the files in the installed folder
Install, un-install and re-install the software to check if the files are added / removed accordingly and no traces of files / folders are available post an un-install Un-install the software on various devices on different Operating systems with various different privileges Test by changing system date and time for licensing and install software to systems remotely and directly on an authorized and un-authorized system Test to un-install and guide the user to un-install a software by reading out from the un-installation guide Un-installation removes installed files and folders completely. Install on the same machine to a different location - un-install Install on the same machine with a different folder name - un-install Cancel un-installation - check if the files and folders are partially / completely removed Un-install and re-install - check the files / folders removed and added
Regedit Check the registry post un-installation
Un-Installation guide
Check for the correctness of new features added, fixes provided and update version - across the manual Available in different languages with instructions to download, install, setup, trouble shoot and un-install
Download and Installables
Genuine software Virus free
Localization and Internationalization
Available and accessible by all it's users across nations Ease of access Modes of access Genuine and piracy free
Privileges
Who can download and install? Who can execute the installed software? Define read, write, execute permissions to users on your network Block / revoke access to users no longer in your network / enterprise
Control Panel
Tests in Control Panel: Un-installed software does not feature in the programs and features Can be un-installed Notifications / Updates / Subscription E-mails are no longer available Can be un-installed by a privileged user
Logging
Enable logging to check the ip addresses on which a software is installed Number of executable requests sent Un-installation notes are logged
Audit
Timely audit the systems in your network Check the logs for suspicious and unauthorized installations Record and report any malware's installed Maintain strict guidelines to keep a check on piracy Enforce use of genuine softwares
Licensing
Record the number of licenses available and distributed Alert the users on an expired license Renew and check the validity of a license Validate the license key for authenticity and the installer for authorization
File Tranfers
Block the transfer of executables via Emails Block the transfer of suspicious and unauthorized files over the Firewall Check the incoming files and file size as the .exe can be masked to any other extension to gain an entry into a firewall protected system
Check
The number of installations made per IP address / person / day Number of requests raised for software installations without a valid business reason
Freeware
Not always a threat Base the request made to install a freeware on usability Authorize and provide guidelines to use freewares Report any incident to the IT Infrastructure team if there is one when using a freeware
Performance
Check the performance of un-installation from command prompt Versus un-installing from control panel versus un-installing remotely
Study the performance on different devices and operating systems
Security
Unauthorized users do not have download and install permission Password protected files can be executed by privileged users Software can be downloaded, installed and un-installed remotely by a privileged / authorized user only Any breach is reported to the concerned person / team Guidelines to install and un-install are made available only to the authorized users Information relating to software maintenance is made available and is addressed only to the authorized users and is done timely Any changes to the files and permissions to the installed folder is reported to the concerned team
Check that the package / seal is not broken when the software is purchased Beware of license thefts Beware of cheap imitations luring naive customers to download /buy a software from an unauthorized online / offline buyer Click on links in emails only after thorough investigation Restrict auto-execution of executables wherever required
Claims
Un-installation removes files and folders from the installed location Control panel no longer reflects the software un-installed
Report any discrepancy from the claims made
Messages
Spell and grammar check is done before releasing the software Check for valid success and error messages Length / size /color / font of the message box / alerts is checked Re-direct the user to the software site for re-download / re-install in case of any errors for freewares
Mobile
Remember to test these ideas on different mobile devices and Operating Systems